The ONE! One Schedule to Rule Them All!

Total Page:16

File Type:pdf, Size:1020Kb

The ONE! One Schedule to Rule Them All! The ONE! One Schedule to Rule them All! Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 29. It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use. The intent is still to be a resource to answer the question at the end of an hour of "What's next?" As a general rule I do not include: • Off-site events • Blatent vender pitch events • Nonspecific timed events. Unfortunately this means the contests aren't on the regular schedule. • DEF CON events are emphasized, so BSides Las Vegas and BlackHat tend to not show up Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here. Check out the Guides/Tips/FAQs links if you're new to Las Vegas. Notable suggestions are: • Bring comfortable shoes, you'll be doing a lot more walking than you expect • Bring a water bottle to keep hydrated • Beware of going out doors, there's nothing like LV sun and heat • Everything in Las Vegas is a longer walk than you think • Relax, don't try to see everything, you'll never be able to! • Have FUN! 1 And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to [email protected] Have a good time at DEF CON 29! 2 Index of DEF CON 29 Activities Maps and detailed Village Info Hour by Hour list of happenings, start at the top, or go to a specific day. Schedule - Thursday - Friday - Saturday - Sunday Sorted list of all the Speakers Names linked to their talk's description. Speaker List Sorted list of all the Talk's titles linked to the talk description. Talk Title List Talk lists for each Village, start at the alphabetic top, or go to a specific Village. Village Talk List AIV - APV - ASV - AVV - BCV - BHV - BICV - BTV - CAHV - CCV - CHV - CLV - CON - CPV - DC - DDV - DL - HHV - HRV - HTSV - ICSV - IOTV - LBV - LPV - MUS - PHV - PYV - RCV - RFV - RGV - SEV - SOC - VMV - WS Descriptions and Info for all the talks. Talk Descriptions The latest news from defcon.org DEF CON News The answer to your questsions about DEF CON overall and for this year. DEF CON FAQ DEF CON 29 FAQ Links to DEF CON 29 related pages 3 Maps and detailed Village Info Full map of both Ballys's and Paris 4 5 Closeup view of activities at Paris Full Map 6 7 Closeup view of activities at Bally's Full Map 8 9 Closeup of Ballys' Resort/Indigo Tower 26'th floor and Jubilee Tower 2/3 floors Full Map 10 11 AVV - Adversary Village AVV VillageTalk List: Home Page: https://adversaryvillage.org/index.html Sched Page: https://adversaryvillage.org/adversary-events/DEFCON-29/ DC Forums Page: https://forum.defcon.org/node/236914 DC Discord Chan: https://discord.com/channels/708208267699945503/865456992101466192 Hours: Fri: 11:00 - 21:00 - Sat: 10:00 - 21:00 - Sun: 10:00 - 17:00 Social Media Links: TW @AdversaryVillag IG @AdversaryVillage LI @adversaryvillage FB @AdversaryVillage TI @AdversaryVillage DC https://discord.gg/GDB3rC7KYz YT link The "Adversary Village" is a community torqued combat readiness platform purely focused on Adversary simulation, emulation tactics, Simulation CTFs, Supply chain security attack tactics, Adversary Tactics and urban survival skills. This is different from any of what has been covered in the existing villages because our focus is on simulation of the actions of a threat actor or an adversary and this being simulated here. As this domain matures, we anticipate active participation from enterprises as such simulations would help immensely towards internal capacity building from having a "live fire" training opportunity. An increasing number of researchers too are focusing on building tools and techniques for simulation of various adversarial actions against an organization or Supply chain, instead of actual real-world exploitation.The goal of the Adversary Village would be to build an open Security community for the researchers and organizations, who are putting together new means and methodologies towards the simulation/emulation of adversary tactics. Return to Index ASV - Aerospace Village ASV VillageTalk List: Home Page: https://aerospacevillage.org/ Sched Page: https://aerospacevillage.org/events/upcoming-events/def-con-29/def-con-29-schedule/ DC Forums Page: https://forum.defcon.org/node/236573 DC Discord Chan: https://discord.com/channels/708208267699945503/732393044363444264 Hours: Fri: 10:00 - 16:00 - Sat: 10:00 - 16:00 Social Media Links: TW @secureaerospace LI @aerospace-village TW @hack_a_sat The Aerospace Village at DEF CON will encompass all aspects of the aerospace sector ranging from airports, air traffic management, aircraft and space. The aviation and space industries, security researchers, and the public share a common goal: safe, reliable, and trustworthy aviation and space operations. For too long, negative perceptions and fractured trust on all sides have held back collaboration between the aviation, space, and security researcher communities that has advanced safety, reliability, and security of other 12 industries. As the traditional domains of aviation safety and cybersecurity increasingly overlap, more effective collaboration between stakeholders ensures we will be safer, sooner, together. Through the Aerospace Village, the security research community invites industry leaders, researchers and academia interested in aviation and space security, safety, and resilience to attend, understand, collaborate together to achieve our common goals. Empathy and understanding build common ground, while acts and words likely to increase division between these two communities undermine these efforts. The Aerospace Village welcomes those who seek to improve aviation and space security, safety, and resilience through positive, productive collaboration among all ecosystem stakeholders. Our Goal The Aerospace Village is a volunteer team of hackers, pilots, and policy advisors who come from the public and private sectors. We believe the flying public deserves safe, reliable, and trustworthy air travel which is highly dependent on secure aviation and space operations. Our Mission Create, sustain, and grow an inclusive community focused on aerospace cybersecurity; Inspire the next generation of aerospace cybersecurity leaders; Promote and develop aerospace cybersecurity expertise and knowledge. The Aviation Village will do this by: - Building connections, trust, and understanding among all Village participants. - Developing aerospace security skills among DEF CON attendees through workshops and hands-on activities. - Promoting constructive dialog through talks and interaction.? Return to Index AIV - AI Village AIV VillageTalk List: Home Page: https://aivillage.org/ Sched Page: https://aivillage.org/events/2020/8/4/ai-village-def-con-28-safe-mode-w6wsl DC Forums Page: https://forum.defcon.org/node/236533 DC Discord Chan: https://discord.com/channels/708208267699945503/732733090568339536 Hours: Fri: 09:00 - 17:00 - Sat: 09:00 - 17:00 - Sun: 09:00 - 14:00 Social Media Links: TW @aivillage_dc TI @aivillage YT link DC https://aivillage.org/discord-guide Artificial Learning techniques are becoming more prevalent in core security technologies like malware detection and network traffic analysis. Its use has opened up new vectors for attacks against non-traditional targets, such as deep learning based image recognition systems used in self driving cars. There are unique challenges in defending and attacking these machine learning systems that the security community needs to be made aware of. This AI Village will introduce DEF CON attendees to these systems and the state of the art in defending and attacking them. We will provide a setting to educate DEF CON at large through workshops and a platform for researchers in this area to share the latest research. Our main focus is on expanding the hands-on activities that attendees can participate in. This year, attendees will create a realistic face using StyleGAN, learn how to generate text, and attack a discriminatory resume screening program. We'll also have talks via CFP, and workshops: both introductory ML for beginners and intermediate/advanced on Facial Recognition/Adversarial ML. We are planning three contests inside the village: one as a standard CTF, another on evading a malware classifier (Ember), and a final realtime panel of Deepfaked DarkTangent's answering personal questions and giving opinions on life, the universe, and everything! 13 Return to Index APV - AppSec Village APV VillageTalk List: Home Page: https://www.appsecvillage.com/ Sched Page: https://www.appsecvillage.com/events/dc-2021 DC Forums Page: https://forum.defcon.org/node/236574 DC Discord Chan: https://discord.com/channels/708208267699945503/790973922949726228 Social Media Links: TW @AppSec_Village LI @appsecvillage YT https://www.youtube.com/c/AppSecVillage The first two AppSec Villages were a resounding success. We learned that whether in person or online, our AppSec community is fantastic. We are pumped to be back bigger and better. Come immerse yourself in everything the world of application security has to offer. Whether you are a red, blue, or purple teamer, come learn from the best of the best to exploit software vulnerabilities and secure software.

  1061
Recommended publications
  • Rooted Elements a Kinesthetic Approach Connecting Our Children to Their Nnei R and Outer World Alisha Meyer the University of Montana
    University of Montana ScholarWorks at University of Montana Graduate Student Theses, Dissertations, & Graduate School Professional Papers 2012 Rooted Elements A Kinesthetic Approach Connecting Our Children to Their nneI r and Outer World Alisha Meyer The University of Montana Let us know how access to this document benefits ouy . Follow this and additional works at: https://scholarworks.umt.edu/etd Recommended Citation Meyer, Alisha, "Rooted Elements A Kinesthetic Approach Connecting Our Children to Their nneI r and Outer World" (2012). Graduate Student Theses, Dissertations, & Professional Papers. 1385. https://scholarworks.umt.edu/etd/1385 This Professional Paper is brought to you for free and open access by the Graduate School at ScholarWorks at University of Montana. It has been accepted for inclusion in Graduate Student Theses, Dissertations, & Professional Papers by an authorized administrator of ScholarWorks at University of Montana. For more information, please contact [email protected]. ROOTED ELEMENTS A KINESTHETIC APPROACH CONNECTING OUR CHILDREN TO THEIR INNER AND OUTER WORLD By ALISHA BRIANNE MEYER BA Elementary Education, University of Montana, Missoula, Montana, 2003 Professional Paper presented in partial fulfillment of the requirements for the degree of Master of Arts Fine Arts, Integrated Arts and Education The University of Montana Missoula, MT May 2012 Approved by: Sandy Ross, Associate Dean of The Graduate School Graduate School Karen Kaufmann, Chair Fine Arts Jillian Campana, Committee Member Fine Arts Rick Hughes, Committee Member Fine Arts © COPYRIGHT by Alisha Brianne Meyer 2012 All Rights Reserved ii Meyer, Alisha, M.A., May 2012 Integrating Arts into Education Rooted Elements Chairperson: Karen Kaufmann Rooted Elements is a thematic naturalistic guide for classroom teachers to design engaging lessons focused in the earth elements.
    [Show full text]
  • The Underpainter
    Canadian Literature / Littérature canadienne A Quarterly of Criticism and Review Number 212, Spring 212 Published by The University of British Columbia, Vancouver Editor: Margery Fee Associate Editors: Judy Brown (Reviews), Joël Castonguay-Bélanger (Francophone Writing), Glenn Deer (Poetry), Laura Moss (Reviews) Past Editors: George Woodcock (1959–1977), W.H. New (1977–1995), Eva-Marie Kröller (1995–23), Laurie Ricou (23–27) Editorial Board Heinz Antor University of Cologne Alison Calder University of Manitoba Cecily Devereux University of Alberta Kristina Fagan University of Saskatchewan Janice Fiamengo University of Ottawa Carole Gerson Simon Fraser University Helen Gilbert University of London Susan Gingell University of Saskatchewan Faye Hammill University of Strathclyde Paul Hjartarson University of Alberta Coral Ann Howells University of Reading Smaro Kamboureli University of Guelph Jon Kertzer University of Calgary Ric Knowles University of Guelph Louise Ladouceur University of Alberta Patricia Merivale University of British Columbia Judit Molnár University of Debrecen Lianne Moyes Université de Montréal Maureen Moynagh St. Francis Xavier University Reingard Nischik University of Constance Ian Rae King’s University College Julie Rak University of Alberta Roxanne Rimstead Université de Sherbrooke Sherry Simon Concordia University Patricia Smart Carleton University David Staines University of Ottawa Cynthia Sugars University of Ottawa Neil ten Kortenaar University of Toronto Marie Vautier University of Victoria Gillian Whitlock University
    [Show full text]
  • Fill Your Boots: Enhanced Embedded Bootloader Exploits Via Fault Injection and Binary Analysis
    IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2021, No. 1, pp. 56–81. DOI:10.46586/tches.v2021.i1.56-81 Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Jan Van den Herrewegen1, David Oswald1, Flavio D. Garcia1 and Qais Temeiza2 1 School of Computer Science, University of Birmingham, UK, {jxv572,d.f.oswald,f.garcia}@cs.bham.ac.uk 2 Independent Researcher, [email protected] Abstract. The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms. Fault injection techniques such as voltage or clock glitching have been proven successful in bypassing such protection for specific microcontrollers, but this often requires expensive equipment and/or exhaustive search of the fault parameters. When multiple glitches are required (e.g., when countermeasures are in place) this search becomes of exponential complexity and thus infeasible. Another challenge which makes embedded bootloaders notoriously hard to analyse is their lack of debugging capabilities. This paper proposes a grey-box approach that leverages binary analysis and advanced software exploitation techniques combined with voltage glitching to develop a powerful attack methodology against embedded bootloaders. We showcase our techniques with three real-world microcontrollers as case studies: 1) we combine static and on-chip dynamic analysis to enable a Return-Oriented Programming exploit on the bootloader of the NXP LPC microcontrollers; 2) we leverage on-chip dynamic analysis on the bootloader of the popular STM8 microcontrollers to constrain the glitch parameter search, achieving the first fully-documented multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive microcontroller.
    [Show full text]
  • Wertheimer, Editor Imagining the Seth Farber an American Orthodox American Jewish Community Dreamer: Rabbi Joseph B
    Imagining the American Jewish Community Brandeis Series in American Jewish History, Culture, and Life Jonathan D. Sarna, Editor Sylvia Barack Fishman, Associate Editor For a complete list of books in the series, visit www.upne.com and www.upne.com/series/BSAJ.html Jack Wertheimer, editor Imagining the Seth Farber An American Orthodox American Jewish Community Dreamer: Rabbi Joseph B. Murray Zimiles Gilded Lions and Soloveitchik and Boston’s Jeweled Horses: The Synagogue to Maimonides School the Carousel Ava F. Kahn and Marc Dollinger, Marianne R. Sanua Be of Good editors California Jews Courage: The American Jewish Amy L. Sales and Leonard Saxe “How Committee, 1945–2006 Goodly Are Thy Tents”: Summer Hollace Ava Weiner and Kenneth D. Camps as Jewish Socializing Roseman, editors Lone Stars of Experiences David: The Jews of Texas Ori Z. Soltes Fixing the World: Jewish Jack Wertheimer, editor Family American Painters in the Twentieth Matters: Jewish Education in an Century Age of Choice Gary P. Zola, editor The Dynamics of American Jewish History: Jacob Edward S. Shapiro Crown Heights: Rader Marcus’s Essays on American Blacks, Jews, and the 1991 Brooklyn Jewry Riot David Zurawik The Jews of Prime Time Kirsten Fermaglich American Dreams and Nazi Nightmares: Ranen Omer-Sherman, 2002 Diaspora Early Holocaust Consciousness and and Zionism in Jewish American Liberal America, 1957–1965 Literature: Lazarus, Syrkin, Reznikoff, and Roth Andrea Greenbaum, editor Jews of Ilana Abramovitch and Seán Galvin, South Florida editors, 2001 Jews of Brooklyn Sylvia Barack Fishman Double or Pamela S. Nadell and Jonathan D. Sarna, Nothing? Jewish Families and Mixed editors Women and American Marriage Judaism: Historical Perspectives George M.
    [Show full text]
  • Between Enforcement and Regulation
    Katharina Voss Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the Between Enforcement and Regulation Between European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss ISBN 978-91-7797-570-0 Department of Law Doctoral Thesis in European Law at Stockholm University, Sweden 2019 Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss Academic dissertation for the Degree of Doctor of Laws in European Law at Stockholm University to be publicly defended on Friday 12 April 2019 at 10.00 in Nordenskiöldsalen, Geovetenskapens hus, Svante Arrhenius väg 12. Abstract This thesis examines the current design of the system of case resolution mechanisms used by the European Commission (the Commission) where an infringement of Articles 101 and 102 TFEU is suspected and advances some proposals regarding this design. Infringements of Articles 101 and 102 TFEU cause considerable damage to the EU economy and ultimately, to consumers. Despite intensified enforcement of Articles 101 and 102 TFEU and ever-growing fines imposed for such infringements, the Commission continues to discover new infringements, which indicates a widespread non-compliance with EU competition rules. This raises the question of whether the enforcement currently carried out by the Commission is suitable for achieving compliance with Articles 101 and 102 TFEU. The thesis is divided into four main parts: First, the objectives pursued by the system of case resolution mechanisms used by the Commission are identified.
    [Show full text]
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • Flower Power Daisy CEO Neil Muller on the Firm’S Plans to Blossom Into a £1Bn Business 16
    March 2017 Flower power Daisy CEO Neil Muller on the firm’s plans to blossom into a £1bn business 16 ESSENTIAL ELEMENTS OF A GOOD PARTNER PROGRAMME 20 EMERGING CHANNEL OPPORTUNITIES IN THE AREA OF DATA ANALYTICS 25 WHAT THE CHANGES TO G-CLOUD MEAN FOR SUPPLIERS 32 REMOTE CONTROL 7th Gen Intel® Core™ vPro™ processorsocessors and Intel® Active Management Technologychnology help reduce on-site IT support costs.ts. SMART REMOTE MANAGEABILITY £ª®°£¢³¡£­¬[±§²£±³®®­°²¡­±²±µ§²¦°£«­²£¢§¥¬­±²§¡± WIRELESS DEVICE MANAGEMENT ¶£¡³²£°£«­²£¦§¥¦[°£±­ª³²§­¬°£§«¥§¬¥¤­°ª­µ£°1 SIMPLIFY PC LIFESTYLE TRANSITIONS §®£¢²§¬±£¡­¬¢±¤°­«¬·µ¦£°£°­³¬¢²¦£µ­°ª¢µ§²¦¬²£ª£«­²£ £¡³°£°±£¤­°¬²£ª¾­ª§¢²²£°§´£±1 ¬²£ª²£¡¦¬­ª­¥§£±Ì¤£²³°£±¬¢ £¬£ß²±¢£®£¬¢­¬±·±²£«¡­¬ß¥³°²§­¬¬¢«·°£¯³§°££¬ ª£¢¦°¢µ°£±­¤²µ°£­°±£°´§¡£¡²§´²§­¬£°¤­°«¬¡£´°§£±¢£®£¬¢§¬¥­¬±·±²£« ¡­¬ß¥³°²§­¬¦£¡©µ§²¦·­³°±·±²£««¬³¤¡²³°£°­°°£²§ª£°­°ª£°¬«­°£²¦²²®``±³®®­°²§¬²£ª¡­« ½¬²£ª­°®­°²§­¬ ªª°§¥¦²±°£±£°´£¢¬²£ª²¦£¬²£ªª­¥­¬²£ª­°£²¦£¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£ª­¥­¬²£ª¶®£°§£¬¡£¦²Ì±¬±§¢£¬²£ª¬±§¢£ ¬¢¬²£ª´°­°£²°¢£«°©±­¤¬²£ª­°®­°²§­¬§¬²¦£¬¢`­°­²¦£°¡­³¬²°§£± Call our specialist sales teams North 01282 776776 South 01256 707070 a Company store.exertis.co.uk Haymarket House, 28-29 Haymarket, London SW1Y 4RX Tel: (020) 7316 9000 Editorial Editor Doug Woodburn 9517 [email protected] Deputy editor Hannah Breeze 9510 [email protected] Reporter Tom Wright 9097 [email protected] Avoiding a public Channelnomics.eu Content editor Sam Trendall 9813 [email protected] tongue-lashing Reporter Josh Budd
    [Show full text]
  • OECD‘S Directorate for Science Technology and Industry
    THE ECONOMIC AND SOCIAL ROLE OF INTERNET INTERMEDIARIES APRIL 2010 2 FOREWORD FOREWORD This report is Part I of the larger project on Internet intermediaries. It develops a common definition and understanding of what Internet intermediaries are, of their economic function and economic models, of recent market developments, and discusses the economic and social uses that these actors satisfy. The overall goal of the horizontal report of the Committee for Information, Computer and Communications Policy (ICCP) is to obtain a comprehensive view of Internet intermediaries, their economic and social function, development and prospects, benefits and costs, and responsibilities. It corresponds to the item on 'Forging Partnerships for Advancing Policy Objectives for the Internet Economy' in the Committee‘s work programme. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 59th Session in March 2010. It was originally issued under the code DSTI/ICCP(2009)9/FINAL. Issued under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD member countries. ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population.
    [Show full text]
  • Protecting the Crown: a Century of Resource Management in Glacier National Park
    Protecting the Crown A Century of Resource Management in Glacier National Park Rocky Mountains Cooperative Ecosystem Studies Unit (RM-CESU) RM-CESU Cooperative Agreement H2380040001 (WASO) RM-CESU Task Agreement J1434080053 Theodore Catton, Principal Investigator University of Montana Department of History Missoula, Montana 59812 Diane Krahe, Researcher University of Montana Department of History Missoula, Montana 59812 Deirdre K. Shaw NPS Key Official and Curator Glacier National Park West Glacier, Montana 59936 June 2011 Table of Contents List of Maps and Photographs v Introduction: Protecting the Crown 1 Chapter 1: A Homeland and a Frontier 5 Chapter 2: A Reservoir of Nature 23 Chapter 3: A Complete Sanctuary 57 Chapter 4: A Vignette of Primitive America 103 Chapter 5: A Sustainable Ecosystem 179 Conclusion: Preserving Different Natures 245 Bibliography 249 Index 261 List of Maps and Photographs MAPS Glacier National Park 22 Threats to Glacier National Park 168 PHOTOGRAPHS Cover - hikers going to Grinnell Glacier, 1930s, HPC 001581 Introduction – Three buses on Going-to-the-Sun Road, 1937, GNPA 11829 1 1.1 Two Cultural Legacies – McDonald family, GNPA 64 5 1.2 Indian Use and Occupancy – unidentified couple by lake, GNPA 24 7 1.3 Scientific Exploration – George B. Grinnell, Web 12 1.4 New Forms of Resource Use – group with stringer of fish, GNPA 551 14 2.1 A Foundation in Law – ranger at check station, GNPA 2874 23 2.2 An Emphasis on Law Enforcement – two park employees on hotel porch, 1915 HPC 001037 25 2.3 Stocking the Park – men with dead mountain lions, GNPA 9199 31 2.4 Balancing Preservation and Use – road-building contractors, 1924, GNPA 304 40 2.5 Forest Protection – Half Moon Fire, 1929, GNPA 11818 45 2.6 Properties on Lake McDonald – cabin in Apgar, Web 54 3.1 A Background of Construction – gas shovel, GTSR, 1937, GNPA 11647 57 3.2 Wildlife Studies in the 1930s – George M.
    [Show full text]
  • Formatting Guide: Colors & Fonts
    SAAS & CLOUD M&A AND VALUATION UPDATE Q1 2016 BOSTON CHICAGO LONDON LOS ANGELES NEW YORK ORANGE COUNTY PHILADELPHIA SAN DIEGO SILICON VALLEY TAMPA CONTENTS Section Page Introduction . Research Coverage: SaaS & Cloud 3 . Key Takeaways 4-5 M&A Activity & Multiples . M&A Dollar Volume 7 . M&A Transaction Volume 8-10 . LTM Revenue Multiples 11-12 . Revenue Multiples by Segment 13 . Highest Revenue Multiple Transaction for LTM 14 . Notable M&A Transactions 15 . Most Active Buyers 16-17 Public Company Valuation & Operating Metrics . SaaS & Cloud 125 Public Company Universe 19-20 . Recent IPOs 21 . Stock Price Performance 22 . LTM Revenue, EBITDA & P/E Multiples 23-25 . Revenue, EBITDA & EPS Growth 26-28 . Margin Analysis 29-30 . Best / Worst Performers 31-32 Notable Transaction Profiles 34-43 Public Company Trading & Operating Metrics 45-50 Technology & Telecom Team 52 1 INTRODUCTION RESEARCH COVERAGE: SAAS & CLOUD Capstone’s Technology & Telecom Group focuses its research efforts on the follow market segments: ENTERPRISE SAAS & MOBILE & WIRELESS CONSUMER INTERNET CLOUD • Analytics / Business Intelligence • Cloud & IT Infrastructure • Cloud Computing / Storage • Communication & Collaboration • Content Creation & Management • CRM & Customer Services • ERP, Supply Chain & Commerce CONSUMER IT & E-COMMERCE • Finance & Administration TELECOM HARDWARE • Human Resources • Marketing & Advertising • Software Conglomerates • Vertical Markets 3 KEY TAKEAWAYS – M&A ACTIVITY & MULTIPLES LTM M&A dollar volume continued to increase in Q1’16, representing
    [Show full text]
  • Anti-Forensic Implications of Software Bugs in Digital Forensic Tools
    Anti-Forensic Implications of Software Bugs in Digital Forensic Tools ALAIN HOMEWOOD Bachelor of Computer and Information Sciences (AUT, NZ) Diploma in Information Technology (AUT, NZ) A thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment of the requirements for the degree of Master of Forensic Information Technology School of Computing and Mathematical Sciences Auckland, New Zealand 2012 ii Declaration I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the qualification of any other degree or diploma of a University or other institution of higher learning, except where due acknowledgement is made in the acknowledgements. ........................... Signature iii Acknowledgements I would like to thank everyone that has supported me in writing this thesis. Without their support this thesis may not have been completed. I have received guidance, support and insight from many people during the course of conducting this research. Firstly I would like to express my gratitude to my thesis supervisor, Dr Brian Cusack. Dr Cusack has provided continual support and guidance which has greatly influenced the direction of this research as well as the quality of the thesis. Dr Cusack is the latest of many faculty members of the School of Computing and Mathematical Sciences who have helped me reach my goals throughout my tertiary education. I also thank Campbell McKenzie for his continued support throughout writing my thesis.
    [Show full text]
  • Crystal Eye Technology Report (Updated) – 2020
    Technology Report Red Piranha’s Crystal Eye Platform Peter Hannay & Clinton Carpene [email protected], [email protected] 16th October 2017 Updated Review Red Piranha’s Crystal Eye XDR Platform v4.0 Kenneth Tan – [email protected] Meidi van der Lee – [email protected] Rossa Risdiana – [email protected] 4th September 2020 The statements made and opinions expressed in this report are believed to be correct by the authors, however the authors assume no responsibility or liability for any errors or omissions in the content of this report. The information contained in this report is provided on an as-is basis with no guarantees of completeness, accuracy, usefulness or timeliness. Any discussion of projections or future performance are subject to interpretation and it must be noted that past performance is not a reliable indicator of future results, as such no responsibility can be accepted for decisions made based on this report. 1 Executive Summary Red Piranha Limited is a public unlisted company registered in Australia and currently based out of Perth and Sydney, developing information security products called the Crystal Eye Extended Detection and Response (CE XDR) platform with the immediate target market being small and medium businesses in Australia and exporting to global markets. The Crystal Eye platform integrates a collection of security technologies to provide multiple layers of cybersecurity protection, giving the benefit of defence-in-depth with comprehensive features even without optional functions installed. Clients can add more functionalities from the Marketplace as required according to each business’ inherent risks and requirements. Additional functionality can be included mostly at no additional cost.
    [Show full text]